If the traffic originates from my local network, the traffic matches the correct firewall rule that has the IPv6 tunnel gateway set and followup traffic gets correctly routed back to its original source.
# netstat -rRouting tablesInternet:Destination Gateway Flags Netif Expiredefault lo0-3.bras1.fi001. UGS pppoe0osba.nl link#8 UHS lo0localhost link#3 UH lo0172.26.0.0/16 link#1 U em0vpoort link#1 UHS lo0dns1.freedom.nl lo0-3.bras1.fi001. UGHS pppoe0lo0-3.bras1.fi001. link#8 UH pppoe0dns2.freedom.nl lo0-3.bras1.fi001. UGHS pppoe0Internet6:Destination Gateway Flags Netif Expiredefault fe80::6a22:8eff:fe UGS pppoe0localhost link#3 UHS lo0dns1.freedom.nl fe80::6a22:8eff:fe UGHS pppoe0dns2.freedom.nl fe80::6a22:8eff:fe UGHS pppoe02d49-3781-2a10.con localhost UGSB lo02a10-3781-2d49.con link#1 U em0vpoort link#1 UHS lo0fe80::%em0/64 link#1 U em0fe80::6c34:c2ff:fe link#1 UHS lo0fe80::%lo0/64 link#3 U lo0fe80::1%lo0 link#3 UHS lo0fe80::%pppoe0/64 link#8 U pppoe0fe80::4003:eb6:a62 link#8 UHS lo0fe80::6c34:c2ff:fe link#8 UHS lo0
# ifconfig pppoe0 pppoe0: flags=88d1<UP,POINTOPOINT,RUNNING,NOARP,SIMPLEX,MULTICAST> metric 0 mtu 1492 description: WANpoort (wan) inet6 fe80::4003:eb6:a62:d503%pppoe0 prefixlen 64 scopeid 0x8 inet6 fe80::6c34:c2ff:feb8:147c%pppoe0 prefixlen 64 scopeid 0x8 inet 45.138.52.95 --> 185.93.175.233 netmask 0xffffffff nd6 options=23<PERFORMNUD,ACCEPT_RTADV,AUTO_LINKLOCAL>